Select Agents and Toxins Security Plan Template

Size: px
Start display at page:

Download "Select Agents and Toxins Security Plan Template"

Transcription

1 Select Agents and Toxins Security Plan Template 7 CFR Part , 9 CFR Part , 42 CFR Part Prepared by U.S. Department of Health and Human Services (HHS) Centers for Disease Control and Prevention (CDC) Division of Select Agents and Toxins Atlanta, GA U.S. Department of Agriculture Animal and Plant Health Inspection Service (APHIS) Agriculture Select Agent Program Riverdale, MD March 8, 2007

2 Preface Intent: The intent of this document is to provide possible practices and procedures that entities may use to assist them in developing and implementing the written security plan required by the select agent regulations. However, the ideas and suggestions provided in this document do not constitute or establish minimum acceptable standards that would automatically meet the requirements of title 7 of the Code of Federal Regulations (CFR) part , 9 CFR , or 42 CFR Revisions: This is a living document subject to ongoing improvement. Feedback or suggestions for improvement from Registered Select Agent entities are welcomed. Submit comments directly to the Select Agent Program at: CDC: LRSAT@cdc.gov APHIS: Agricultural.Select.Agent.Program@aphis.usda.gov. 2

3 Notice to User The attached document is a sample written security plan. This document was prepared as a reference guide and template to assist entities in the development of a site-specific security plan required by the Select Agent Regulations (7 CFR , 9 CFR , or 42 CFR 73.11). The purpose of this guide is to offer assistance in structuring a security plan and assist in identifying the information that should be provided. The user is not limited as to what information to provide. Within the proposed template every effort was made to provide a proposed language section whenever possible. However, some areas are entity specific, and proposed language could not be provided. The user has the option to accept the proposed language exactly as it is written, provided it is an exact fit for the entity. If the proposed language is not an exact fit, the entity may change it to best meet the needs of their facility. When reference is made to the Security Information Document, it is advisable that the entity review those sections. An entity may find the information document useful when writing the site-specific risk assessment. The template follows the order of the inspection checklists used by APHIS and CDC and also follows the order found in Section 11 of the select agent regulations. Formatting of title pages, table of contents, signature pages, tables, charts, and graphics is at the discretion of the user. 3

4 Table of Contents Certification and Approvals...5 I. Written Security Plan...6 II. Site-Specific Risk Assessment...6 III. Physical Security, Inventory Control, and Information Systems Control...8 IV. Access Control...9 V. Routine Cleaning, Maintenance, and Repairs...10 VI. Unauthorized or Suspicious Persons...10 VII. VIII. Loss or Compromise of Keys, Passwords, Combinations Changing Access Numbers or Locks Following Staff Changes...11 Reporting Unauthorized or Suspicious Persons or Activities Loss, Theft, or Release of Select Agents or Toxins Alteration of Inventory Records...11 IX. Understanding and Complying with Security Procedures...12 X. Access Approval...12 XI. XII. Unescorted Access for Cleaning, Maintenance, and Repair Personnel...12 Means of Securing Select Agents and Toxins...12 XIII. Inspection of Packages...13 XIV. Intra-entity Transfers...13 XV. Sharing Access...13 XVI. Reporting Requirements to the Entity s Responsible Official...13 XVII. XVIII. XIX. XX. Public Access Areas...14 Select Agent Reference Document...14 Drills and Exercises...14 Retention of Records

5 Certification and Approvals The Security Plan has been developed by: Name and Title Date The Security Plan for this facility has been prepared with the intent of being in compliance with the Public Health Security and Bioterrorism Preparedness and Response Act of 2002 and 7 CFR Part 331, 9 CFR Part 121, and 42 CFR Part 73. This plan is required to be reviewed annually, or updated when changes occur. Signature of Authorized Responsible Official Date Print Name ANNUAL REVIEW VERIFICATION VERIFICATION DATE SIGNATURE

6 SELECT AGENTS AND TOXINS SECURITY PLAN TEMPLATE 7 CFR Part , 9 CFR Part , 42 CFR Part I. Written Security Plan (Section 11 (a)) This is the written security plan for (name of entity). This written plan addresses and meets the requirements of the Select Agent Final Regulations (7 CFR Part 331, 9 CFR Part 121, and 42 CFR Part 73.). II. Site-Specific Risk Assessment (Section 11 (b)) For the purpose of the written security plan, the entity need only provide a summary of the site-specific risk assessment as follows: Agent-Specific Risk Assessment: This entity has reviewed the APHIS/CDC Security Information Document. Using the definitions in the APHIS/CDC Security Information Document, the overall agent-specific risk for this entity is: est Instructions to entity: Please explain the rationale for your agent-specific risk assessment. Note: Instead of stating the overall risk for agents in the entity s inventory, the entity may want to evaluate each agent independently and conduct the agent-specific risk assessment based on that approach. 6

7 Threat Assessment: This entity has reviewed the APHIS/CDC Security Information Document. Considering all the threats listed in the APHIS/CDC Security Information Document (man, nature, incident), the probability of their occurring are: Man Nature Incident Considering all the threats listed in the APHIS/CDC Security Information Document (man, nature, incident), the consequences should they occur are: Man Nature Incident Instructions to entity: Please explain the rationale for your threat assessment. Vulnerability Assessment Based on a review of the APHIS/CDC Security Information Document, the security weaknesses and deficiencies identified at this facility, and the corrective measures considered, the overall vulnerability at this entity is: Instructions to entity: Please explain the rationale for your vulnerability assessment. Graded Protection (Mitigation Measures) Considerations: Physical security includes any device or protection capability that limits access to select agent activity areas starting from the select agent activity area and working outwards. A device may include locks on storage units, locks on laboratory doors, electronic monitoring systems (including CCTV), card-key access, etc., in any combination. Physical barriers also include the laboratory walls (floor to ceiling), a room 7

8 within a room, secured storage rooms, secured storage units, building perimeter walls and fences, security guards, security patrols, etc., in any combination. Instructions to entity: Please explain the rationale for the measures you determined that addresses the graded protection. Entity Security Consensus Meeting: The relevant staff members at this entity (such as the Principal Investigator, Security Staff, Responsible Official, Alternate Responsible Official, Institutional Biosafety Committee and Laboratory Management) have met and concluded that based upon the agent, threat and vulnerability assessments the following security measures are necessary to prevent the theft, loss, and release of select agents and toxins (list all measures below): III. Physical Security, Inventory Control, and Information Systems Control (Section 11 (c)(1)) Physical Security Considerations: The requirements for the security plan as described in Section 11 requires a detailed written description of security procedures and protocols to safeguard select agents and toxins. In order to have a comprehensive written plan, the entity needs to articulate its security systems and procedures tailored to site-specific characteristics and requirements including on-going programs and operational needs. Most important is to mitigate the risks of loss, theft or release of select agents and toxins. Instructions to the entity: Please describe in your plan how your laboratory addresses physical security. Inventory Control Considerations: If the entity receives select agents and toxins, the security plan should describe how select agents and toxins are handled and accounted for in the inventory once received. This should include the identification of a receiving area where select agent material is delivered by the courier. This descriptive narrative should also include assurances that the intra-entity transfers of select agents and toxins are safeguarded and accounted for while in transport (chain of custody). The entity should have written 8

9 procedures from both a biosafety and security perspective when select agents and toxins are transported from one building to another or from one floor to another. In short, the inventory must accurately reflect the transfer and receipt of all select agents and toxins. Instructions to the entity: Please review the APHIS/CDC Security Information Document relating to inventory requirements and describe in your plan how your laboratory addresses inventory tracking for each of the following requirements: Select Agent Inventory. Reference is Section 17 (a)(1)(i-v) and (a)(6) Toxin Inventory. Reference is Section 17 (a)(2)(i-vi, x) and (a)(6) Intra-entity Transfer Inventory. Reference is Section 17 (a)(2)(vii and viii) Information Systems Control Considerations: Information security includes procedures and protocols for information systems control such as electronic storage (computers) and hardcopy records (logbooks, registrations, inventories, etc.). Both are required to be secured under controlled access. Electronic storage requires appropriate safeguards such as passwords, firewalls, secured space, a back-up mechanism, etc. An electronic storage device can be a network and/or a stand-alone unit. The entity is required to describe what procedures are in place to prevent unauthorized access to select agent and toxin information. Instructions to the entity: Please review the APHIS/CDC Security Information Document relating to information systems and describe in your plan how your laboratory addresses the security of electronic and hard copy data. IV. Access Control (Section 10 (b), Section 11 (c)(2), and Section 17 (a)(4)) Access Control, SRA Approval and Recording Access Considerations: Any individual will be deemed to have access at any point in time if the individual has possession of a select agent or toxin (e.g., ability to carry, possess, use, transfer, or manipulate) or the ability to gain possession of a select agent or toxin. Access controls include basic security devices such as padlocks and keys to the more elaborate devices such as card keys and biometrics. The results of the sitespecific risk assessment can guide the entity in deciding what security devices to use. Anyone requiring access to restricted areas where select agents and toxins are possessed, used, or transferred must have an approved Security Risk Assessment (SRA) and be listed on the entity s 9

10 APHIS/CDC Form 1, Section 4B. Authorized visitors must be escorted at all times by an SRA-approved individual. Access can be recorded electronically through the use of card keys and biometric readers or through the use of manual methods such as log books. Entities should ensure all access logs accurately reflect the name, date, and time of entry. Piggybacking and tailgating on another individual s electronic access will result in an entry not being recorded. The Responsible Official, Alternate Responsible Official, or the Principal Investigator should closely monitor access to the select agent laboratories, and if piggybacking or tailgating is observed, it should be stopped immediately and raise the concern for additional training. All access logs must be retained for 3 years. Instructions to the entity: Please review the APHIS/CDC Security Information Document relating to access control and describe in your plan how access is controlled at the entity. V. Routine Cleaning, Maintenance and Repairs (Section 11 (c)(3)) Cleaning, Maintenance and Repair Provisions Considerations: The entity s security plan must contain provisions for routine cleaning, maintenance, and repairs. The Responsible Official should be aware when cleaning, maintenance, and repairs are performed. Consideration should be given to ensure that cleaning and maintenance services take place as a scheduled event. The entity should also make provisions for after-hours emergencies such as a broken water line in the select agent laboratory or failure of major equipment. The entity needs to be sensitive to who is providing the cleaning and maintenance services (staff or contract employees?). Cleaning and maintenance staff must also receive training before they enter these spaces. Refer to section 15 (a) in the CFR. Instructions to the entity: Please review the APHIS/CDC Security Information Document relating to cleaning, maintenance, and repair, and describe in your plan how your laboratory addresses these provisions. VI. Unauthorized or Suspicious Persons (Removal) (Section 11 (c)(4)) Proposed language: SRA-approved individuals are required to remove all unauthorized and suspicious persons in and around the select agent area immediately and report them immediately to the Responsible Official, Alternate Responsible Official, and other management as appropriate. SRA-approved individuals also have the responsibility to police restricted areas and keep out other departmental staffs that do not belong. 10

11 Individuals at this facility who are approved by the HHS Secretary or APHIS Administrator receive annual training regarding the removal of unauthorized or suspicious persons and the reporting requirements. Staff members at this facility have been trained to challenge individuals who have no Identification badges or displayed credentials. Training also includes reporting and follow-up requirements and identification verification procedures. VII. Loss or Compromise of Keys, Passwords, Combinations Changing Access Numbers or Locks Following Staff Changes (Section 11 (c)(5)) Proposed Language: Upon loss or compromise of keys, passwords, and combinations or upon staff changes, access to select agents controlled by electronic means (including computer passwords and combinations) are changed immediately. Access to select agents that are controlled by standard lock and key will have locks replaced immediately, including the purchase or replacement of lock boxes. When keys and access cards have been inadvertently left at home, the Responsible Official will ensure that a temporary access pass is issued for the day. Inventory of select agents will be conducted prior to the issuance of new card-key codes, combinations, and keys to SRA-approved individuals. VIII. Reporting Unauthorized or Suspicious Persons or Activities Loss, Theft or Release of Select Agents or Toxins Alteration of Inventory Records (Section 11 (c)(6)) Proposed Language: All entity personnel, whether authorized to possess, use, or transfer select agents or not, are instructed to immediately report any suspicious persons or activities to the Responsible Official and/or the Alternate Responsible Official. Any suspected loss or theft of a select agent or toxin must be immediately reported to the Responsible Official or the Alternate Responsible Official. Upon notification of a loss or theft, the Responsible Official or the Alternate Responsible Official has the authority to suspend all select agent activity, disable all card-keys to the select agent activity area, and notify APHIS/CDC as appropriate. APHIS/CDC Form 3 (Report of Theft, Loss or Release of Select Biological Agents and Toxins) must be completed and submitted to APHIS/CDC as appropriate within 7 days. 11

12 If for any reason there is suspicion that the inventory and use records of the select agents or toxins have been altered or compromised, it must be reported to the Responsible Official or the Alternate Responsible Official. The Responsible Official or the Alternate Responsible Official will immediately initiate an investigation to further determine what has occurred. APHIS/CDC will be notified immediately in situations where a theft or loss has occurred. When directed, local law enforcement and/or the FBI will be consulted. IX. Understanding and Complying with Security Procedures (Section 11 (c)(7) and Section 15) Proposed Language: At this facility, training is conducted that addresses the needs of the individuals, the work they will do, and the risks posed by select agents and toxins. Training is also provided regarding the security procedures associated with select agents and toxins. This information is presented in a formal class setting. Validation of understanding the information is accomplished with a test. All persons authorized to work with select agents and toxins shall review and be familiar with this site-specific security plan. X. Access Approval (Section 11 (d)(1)) Proposed Language: At this facility, all personnel working with select agents and toxins are approved by the APHIS Administrator or HHS Secretary (SRA) approved) and are listed on APHIS/CDC Form 1, Section 4B. XI. Unescorted Access for Cleaning, Maintenance, and Repair Personnel (Section 11 (d)(2)) Proposed Language: At this facility, unapproved individuals such as maintenance, cleaning, and repair personnel cannot enter select agent areas for cleaning and repairs unescorted. Note: Please review the APHIS/CDC Security Information Document relating to cleaning, maintenance and repair and describe in your plan how your laboratory addresses these provisions. XII. Means of Securing Select Agents and Toxins (Section 11 (d)(3)) Proposed Language: Select agent areas are isolated from public access. Access to all areas where select agents and toxins are possessed, used, or transferred is controlled by (insert means of security here) for personnel who are SRA approved. These laboratories are locked and monitored at all times. No other facility personnel have access to these areas. Within the freezer unit, select agents are secured by a lock and key. The key and key log is controlled by the Responsible Official. A log (manual or electronic) is maintained that records name, date, and 12

13 time of entry. Logbooks are maintained and secured in a locked file cabinet by the Responsible Official. Select agents and toxins are possessed, used or transferred in Room(s). Select agents and toxins are stored in Room(s). The select agent laboratory has a motion-activated alarm that is armed when the last person leaves the lab. Alarms and video cameras are monitored by the security staff on duty. Video cameras are security surveillance tools and not subject to recordkeeping requirements at this facility. (Note: The devices listed in this paragraph are examples of proposed language if a laboratory had an alarm and video surveillance system). XIII. Inspection of Packages (Section 11 (d)(4)) Proposed language: All packages, containers, carts, bags, and briefcases that appear to be a suspicious nature are inspected by the Principal Investigator or his designee. This applies to all packages of a suspicious nature entering or leaving the select agent areas. XIV. Intra-entity Transfers (Section 11 (d)(5)) Proposed Language: All intra-entity transfers at this facility will be handled by the Responsible Official, who will ensure that the facility intra-entity transfer form is used along with chain of custody and that the transfer or receipt of the select agent and toxin is accurately reflected on the inventory. This responsibility, at the discretion of the Responsible Official may be delegated to a Biosafety Professional provided this individual is SRA approved. All biosafety and security provisions will be worked out and discussed prior to any intra-entity transfer at this facility. Police escort may be necessary to ensure transfers are conducted in a secure manner (e.g., between floors, buildings, etc). (Examples of the forms are available in the Select Agent and Toxin Security Information Document.) XV. Sharing Access (Section 11 (d)(6)) Proposed language: At this facility, individuals approved for unescorted access are not to share their unique means of access such as passwords, PIN numbers, keys, and key cards that allow access to the area(s) where select agents and toxins are possessed, used, or transferred. XVI. Reporting Requirements to the Entity s Responsible Official (Sections 11 (d)(7)(i) through (v)) Proposed Language: At this facility, the following must be reported to the Responsible Official: Any loss or compromise of keys, passwords, combinations, etc. Any suspicious persons or activities Any loss or theft of select agents or toxins 13

14 Any release of a select agent or toxin Any sign that inventory or use records for select agents or toxins have been altered or otherwise compromised Once reported, the Responsible Official will take action to make all appropriate notifications and complete all forms, including the required follow-up. XVII. Public Access Areas (Section 11 (d)(8)) Proposed Language: At this facility, rooms where select agents and toxins are possessed, used, or transferred are separate from public access areas. XVIII. Select Agent Reference Document (Section 11 (e)) Proposed Language: The document entitled Laboratory Security and Emergency Response Guidance for Laboratories Working with Select Agents, published in Morbidity and Mortality Weekly Report (December 6, 2002; 51:RR-19:1-6) is available at this facility and is on file in the Responsible Official s office. XIX. Drills and Exercises (Section 11 (f)) Proposed Language: Drills and exercises conducted at this facility that satisfy the requirements of the Biosafety, Security, and Incident Response Plans are conducted on an annual basis and the drills conducted by this facility are summarized as an attachment to our incident response plan. All written plans at this facility are updated annually and when drills and exercises warrant update. XX. Retention of Records (Section 17 (c)) Proposed Language: Records relating to security are required to be retained for 3 years and include the following: Inventory, transfers, theft, loss and release, Responsible Official s records, security, biosafety, incident response, and training. Security cameras at this facility are used as security monitoring devices. 14

BIOSECURITY TOOLBOX A Personal Perspective

BIOSECURITY TOOLBOX A Personal Perspective BIOSECURITY TOOLBOX A Personal Perspective ANDREW CANNONS, Ph.D. SCIENTIFIC DIRECTOR USF CENTER FOR BIOLOGICAL DEFENSE Toolbox for a Security Plan A defined set of tools that a user might need for a particular

More information

Red Flags/Identity Theft Prevention Policy: Purpose

Red Flags/Identity Theft Prevention Policy: Purpose Red Flags/Identity Theft Prevention Policy: 200.3 Purpose Employees and students depend on Morehouse College ( Morehouse ) to properly protect their personal non-public information, which is gathered and

More information

How AlienVault ICS SIEM Supports Compliance with CFATS

How AlienVault ICS SIEM Supports Compliance with CFATS How AlienVault ICS SIEM Supports Compliance with CFATS (Chemical Facility Anti-Terrorism Standards) The U.S. Department of Homeland Security has released an interim rule that imposes comprehensive federal

More information

HIPAA Security. 3 Security Standards: Physical Safeguards. Security Topics

HIPAA Security. 3 Security Standards: Physical Safeguards. Security Topics HIPAA Security SERIES Security Topics 1. Security 101 for Covered Entities 2. Security Standards - Administrative Safeguards 3. Security Standards - Physical Safeguards 4. Security Standards - Technical

More information

Policy and Procedure: SDM Guidance for HIPAA Business Associates

Policy and Procedure: SDM Guidance for HIPAA Business Associates Policy and Procedure: SDM Guidance for HIPAA Business (Adapted from UPMC s Guidance for Business at http://www.upmc.com/aboutupmc/supplychainmanagement/documents/guidanceforbusinessassociates.pdf) Effective:

More information

SECURITY & PRIVACY DOCUMENTATION

SECURITY & PRIVACY DOCUMENTATION Okta s Commitment to Security & Privacy SECURITY & PRIVACY DOCUMENTATION (last updated September 15, 2017) Okta is committed to achieving and preserving the trust of our customers, by providing a comprehensive

More information

U.S. Department of Health and Human Services (HHS) The Office of the National Coordinator for Health Information Technology (ONC)

U.S. Department of Health and Human Services (HHS) The Office of the National Coordinator for Health Information Technology (ONC) U.S. Department of Health and Human Services (HHS) The Office of the National Coordinator for Health Information Technology (ONC) Security Risk Assessment Tool Physical Safeguards Content Version Date:

More information

Page 1 of 15. Applicability. Compatibility EACMS PACS. Version 5. Version 3 PCA EAP. ERC NO ERC Low Impact BES. ERC Medium Impact BES

Page 1 of 15. Applicability. Compatibility EACMS PACS. Version 5. Version 3 PCA EAP. ERC NO ERC Low Impact BES. ERC Medium Impact BES 002 5 R1. Each Responsible Entity shall implement a process that considers each of the following assets for purposes of parts 1.1 through 1.3: i. Control Centers and backup Control Centers; ii. Transmission

More information

Identity Theft Prevention Policy

Identity Theft Prevention Policy Identity Theft Prevention Policy Purpose of the Policy To establish an Identity Theft Prevention Program (Program) designed to detect, prevent and mitigate identity theft in connection with the opening

More information

ORA HIPAA Security. All Affiliate Research Policy Subject: HIPAA Security File Under: For Researchers

ORA HIPAA Security. All Affiliate Research Policy Subject: HIPAA Security File Under: For Researchers All Affiliate Research Policy Subject: HIPAA File Under: For Researchers ORA HIPAA Issuing Department: Office of Research Administration Original Policy Date Page 1 of 5 Approved by: May 9,2005 Revision

More information

Policies & Procedures Effective Date: January 24, Key Control

Policies & Procedures Effective Date: January 24, Key Control LSU Health Sciences Center Page 1 of 9 Key Control POLICY: Lost or stolen keys can pose a serious threat to the University s security and the potential theft or loss of State property. In order to provide

More information

Prevention of Identity Theft in Student Financial Transactions AP 5800

Prevention of Identity Theft in Student Financial Transactions AP 5800 Reference: Fair and Accurate Credit Transactions Act (Pub. L. 108-159) The Board recognizes that some activities of the Shasta-Tehama-Trinity Joint Community College District, "District," are subject to

More information

Standard CIP-006-3c Cyber Security Physical Security

Standard CIP-006-3c Cyber Security Physical Security A. Introduction 1. Title: Cyber Security Physical Security of Critical Cyber Assets 2. Number: CIP-006-3c 3. Purpose: Standard CIP-006-3 is intended to ensure the implementation of a physical security

More information

Facility Security Policy

Facility Security Policy 1. PURPOSE 1.1 The New Brunswick Institute for Research, Data and Training (NB-IRDT) is located in the University of New Brunswick. It consists of: (i) employee offices in Singer Hall and Keirstead Hall,

More information

Standard CIP Cyber Security Physical Security

Standard CIP Cyber Security Physical Security A. Introduction 1. Title: Cyber Security Physical Security of Critical Cyber Assets 2. Number: CIP-006-3 3. Purpose: Standard CIP-006-3 is intended to ensure the implementation of a physical security program

More information

HIPAA Security Rule Policy Map

HIPAA Security Rule Policy Map Rule Policy Map Document Information Identifier Status Published Published 02/15/2008 Last Reviewed 02/15/1008 Last Updated 02/15/2008 Version 1.0 Revision History Version Published Author Description

More information

Number: USF System Emergency Management Responsible Office: Administrative Services

Number: USF System Emergency Management Responsible Office: Administrative Services POLICY USF System USF USFSP USFSM Number: 6-010 Title: USF System Emergency Management Responsible Office: Administrative Services Date of Origin: 2-7-12 Date Last Amended: 8-24-16 (technical) Date Last

More information

Standard CIP-006-4c Cyber Security Physical Security

Standard CIP-006-4c Cyber Security Physical Security A. Introduction 1. Title: Cyber Security Physical Security of Critical Cyber Assets 2. Number: CIP-006-4c 3. Purpose: Standard CIP-006-4c is intended to ensure the implementation of a physical security

More information

SECTION 15 KEY AND ACCESS CONTROLS

SECTION 15 KEY AND ACCESS CONTROLS 15.1 Definitions A. The definitions in this section shall apply to all sections of the part unless otherwise noted. B. Definitions: Access Badge / Card a credential used to gain entry to an area having

More information

CYBER SECURITY POLICY REVISION: 12

CYBER SECURITY POLICY REVISION: 12 1. General 1.1. Purpose 1.1.1. To manage and control the risk to the reliable operation of the Bulk Electric System (BES) located within the service territory footprint of Emera Maine (hereafter referred

More information

HIPAA Security Checklist

HIPAA Security Checklist HIPAA Security Checklist The following checklist summarizes the HIPAA Security Rule requirements that should be implemented by both covered entities and business associates. The citations are to 45 CFR

More information

HIPAA Security Checklist

HIPAA Security Checklist HIPAA Security Checklist The following checklist summarizes the HIPAA Security Rule requirements that should be implemented by both covered entities and business associates. The citations are to 45 CFR

More information

Use of Controlled Substances in Research

Use of Controlled Substances in Research Use of Controlled Substances in Research A Tutorial on Regulatory Requirements and the Emory University Policy 7.25 Research Use of Controlled Substances Emory University, Office of Compliance Tutorial

More information

Reliability Standard Audit Worksheet 1

Reliability Standard Audit Worksheet 1 Reliability Standard Audit Worksheet 1 CIP-006-6 Cyber Security Physical Security of BES Cyber Systems This section to be completed by the Compliance Enforcement Authority. Audit ID: Registered Entity:

More information

Security Standards for Electric Market Participants

Security Standards for Electric Market Participants Security Standards for Electric Market Participants PURPOSE Wholesale electric grid operations are highly interdependent, and a failure of one part of the generation, transmission or grid management system

More information

STOCKTON UNIVERSITY PROCEDURE DEFINITIONS

STOCKTON UNIVERSITY PROCEDURE DEFINITIONS STOCKTON UNIVERSITY PROCEDURE Identity Theft Prevention Program Procedure Administrator: Director of Risk Management and Environmental/Health/Safety Authority: Fair and Accurate Credit Transactions Act

More information

TSA/FTA Security and Emergency Management Action Items for Transit Agencies

TSA/FTA Security and Emergency Management Action Items for Transit Agencies TSA/FTA Security and Emergency Management Action Items for Transit Agencies AACTION ITEM LIST Management and Accountability 1. Establish Written System Security Programs and Emergency Management Plans:

More information

Information Security Incident Response Plan

Information Security Incident Response Plan Information Security Incident Response Plan Purpose It is the objective of the university to maintain secure systems and data. In order to comply with federal, state, and local law and contractual obligations,

More information

EXHIBIT A. - HIPAA Security Assessment Template -

EXHIBIT A. - HIPAA Security Assessment Template - Department/Unit: Date: Person(s) Conducting Assessment: Title: 1. Administrative Safeguards: The HIPAA Security Rule defines administrative safeguards as, administrative actions, and policies and procedures,

More information

Chemical Facility Anti-Terrorism Standards. T. Ted Cromwell Sr. Director, Security and

Chemical Facility Anti-Terrorism Standards. T. Ted Cromwell Sr. Director, Security and Chemical Facility Anti-Terrorism Standards T. Ted Cromwell Sr. Director, Security and NJ ELG Operations Meeting Today s Presentation ACC Action Major Rule Components Select Risk-Based Performance Standards

More information

State of Rhode Island Department of Administration Division of Information Technol

State of Rhode Island Department of Administration Division of Information Technol Division of Information Technol 1. Background Physical and environmental security controls protect information system facilities from physical and environmental threats. Physical access to facilities and

More information

Security Guideline for the Electricity Sub-sector: Physical Security Response

Security Guideline for the Electricity Sub-sector: Physical Security Response Security Guideline for the Electricity Sub-sector: Physical Security Response Preamble: This guideline addresses potential risks that can apply to some electricity sub-sector organizations and provides

More information

Information Security Incident Response Plan

Information Security Incident Response Plan Information Security Incident Response Plan Purpose It is the objective of the university to maintain secure systems and data. In order to comply with federal, state, and local law and contractual obligations,

More information

Employee Security Awareness Training Program

Employee Security Awareness Training Program Employee Security Awareness Training Program Date: September 15, 2015 Version: 2015 1. Scope This Employee Security Awareness Training Program is designed to educate any InComm employee, independent contractor,

More information

Schedule Identity Services

Schedule Identity Services This document (this Schedule") is the Schedule for Services related to the identity management ( Identity Services ) made pursuant to the ehealth Ontario Services Agreement (the Agreement ) between ehealth

More information

Management. Port Security. Second Edition KENNETH CHRISTOPHER. CRC Press. Taylor & Francis Group. Taylor & Francis Group,

Management. Port Security. Second Edition KENNETH CHRISTOPHER. CRC Press. Taylor & Francis Group. Taylor & Francis Group, Port Security Management Second Edition KENNETH CHRISTOPHER CRC Press Taylor & Francis Group Boca Raton London New York CRC Press is an imprint of the Taylor & Francis Group, an informa business Preface

More information

Port Facility Cyber Security

Port Facility Cyber Security International Port Security Program Port Facility Cyber Security Cyber Security Assessment MAR'01 1 Lesson Topics ISPS Code Requirement The Assessment Process ISPS Code Requirements What is the purpose

More information

HIPAA Security and Privacy Policies & Procedures

HIPAA Security and Privacy Policies & Procedures Component of HIPAA Security Policy and Procedures Templates (Updated for HITECH) Total Cost: $495 Our HIPAA Security policy and procedures template suite have 71 policies and will save you at least 400

More information

AGREEMENT FOR RECEIPT AND USE OF MARKET DATA: ADDITIONAL PROVISIONS

AGREEMENT FOR RECEIPT AND USE OF MARKET DATA: ADDITIONAL PROVISIONS EXHIBIT C AGREEMENT FOR RECEIPT AND USE OF MARKET DATA: ADDITIONAL PROVISIONS 21. NYSE DATA PRODUCTS (a) SCOPE This Exhibit C applies insofar as Customer receives, uses and redistributes NYSE Data Products

More information

Security Surveillance Camera and Video Policy

Security Surveillance Camera and Video Policy UW-Madison Security Surveillance Camera and Policy Effective Date: Oct. 1, 2014 Last Updated: August 1, 2018 Last Reviewed: August 1, 2018 Functional Owner Executive Sponsor Policy Contact Dir. of Security

More information

Security and Privacy Breach Notification

Security and Privacy Breach Notification Security and Privacy Breach Notification Version Approval Date Owner 1.1 May 17, 2017 Privacy Officer 1. Purpose To ensure that the HealthShare Exchange of Southeastern Pennsylvania, Inc. (HSX) maintains

More information

DRAFT. Standard 1300 Cyber Security

DRAFT. Standard 1300 Cyber Security These definitions will be posted and balloted along with the standard, but will not be restated in the standard. Instead, they will be included in a separate glossary of terms relevant to all standards

More information

Virginia Commonwealth University School of Medicine Information Security Standard

Virginia Commonwealth University School of Medicine Information Security Standard Virginia Commonwealth University School of Medicine Information Security Standard Title: Scope: Personnel Security Standard This standard is applicable to all VCU School of Medicine personnel. Approval

More information

HIPAA/HITECH Privacy & Security Checklist Assessment HIPAA PRIVACY RULE

HIPAA/HITECH Privacy & Security Checklist Assessment HIPAA PRIVACY RULE 164.502 Develop "minimum necessary" policies for: HIPAA PRIVACY RULE 164.514 - Uses 15 Exempts disclosure for the purpose of treatment from the minimum necessary standard. Page references for - Routine

More information

Controlled Substance Training Manual

Controlled Substance Training Manual Controlled Substance Training Manual Last updated Aug2018 Table of Contents I. Purpose... 3 II. Responsibilities... 3 III. DEA Registration... 3 IV. Storage... 4 V. Handling and Transport... 4 VI. Recordkeeping...

More information

Credit Card Data Compromise: Incident Response Plan

Credit Card Data Compromise: Incident Response Plan Credit Card Data Compromise: Incident Response Plan Purpose It is the objective of the university to maintain secure financial transactions. In order to comply with state law and contractual obligations,

More information

Centeris Data Centers - Security Procedure. Revision Date: 2/28/2018 Effective Date: 2/28/2018. Site Information

Centeris Data Centers - Security Procedure. Revision Date: 2/28/2018 Effective Date: 2/28/2018. Site Information Section 01 Document Information Creation Date: 12/1/2016 Centeris Data Centers - Security Procedure Revision Date: 2/28/2018 Effective Date: 2/28/2018 Section 02 Site Information Site Information Document

More information

Subject: University Information Technology Resource Security Policy: OUTDATED

Subject: University Information Technology Resource Security Policy: OUTDATED Policy 1-18 Rev. 2 Date: September 7, 2006 Back to Index Subject: University Information Technology Resource Security Policy: I. PURPOSE II. University Information Technology Resources are at risk from

More information

Data Centers and Mission Critical Facilities Access and Physical Security Procedures

Data Centers and Mission Critical Facilities Access and Physical Security Procedures Planning & Facilities Data Centers and Mission Critical Facilities Access and Physical Security Procedures Attachment B (Referenced in UW Information Technology Data Centers and Mission Critical Facilities

More information

Cyber Security Program

Cyber Security Program Cyber Security Program Cyber Security Program Goals and Objectives Goals Provide comprehensive Security Education and Awareness to the University community Build trust with the University community by

More information

HIPAA Federal Security Rule H I P A A

HIPAA Federal Security Rule H I P A A H I P A A HIPAA Federal Security Rule nsurance ortability ccountability ct of 1996 HIPAA Introduction - What is HIPAA? HIPAA = The Health Insurance Portability and Accountability Act A Federal Law Created

More information

MANUAL OF UNIVERSITY POLICIES PROCEDURES AND GUIDELINES. Applies to: faculty staff students student employees visitors contractors

MANUAL OF UNIVERSITY POLICIES PROCEDURES AND GUIDELINES. Applies to: faculty staff students student employees visitors contractors Page 1 of 6 Applies to: faculty staff students student employees visitors contractors Effective Date of This Revision: June 1, 2018 Contact for More Information: HIPAA Privacy Officer Board Policy Administrative

More information

CIP Cyber Security Physical Security of BES Cyber Systems

CIP Cyber Security Physical Security of BES Cyber Systems A. Introduction 1. Title: Cyber Security Physical Security of BES Cyber Systems 2. Number: CIP-006-5 3. Purpose: To manage physical access to BES Cyber Systems by specifying a physical security plan in

More information

Seattle University Identity Theft Prevention Program. Purpose. Definitions

Seattle University Identity Theft Prevention Program. Purpose. Definitions Seattle University Identity Theft Prevention Program Purpose The purpose of the program is to establish an Identity Theft Prevention Program designed to detect, prevent and mitigate identity theft in connection

More information

Solution Pack. Managed Services Virtual Private Cloud Security Features Selections and Prerequisites

Solution Pack. Managed Services Virtual Private Cloud Security Features Selections and Prerequisites Solution Pack Managed Services Virtual Private Cloud Security Features Selections and Prerequisites Subject Governing Agreement DXC Services Requirements Agreement between DXC and Customer including DXC

More information

Standard CIP Cyber Security Critical Cyber Asset Identification

Standard CIP Cyber Security Critical Cyber Asset Identification Standard CIP 002 1 Cyber Security Critical Cyber Asset Identification Standard Development Roadmap This section is maintained by the drafting team during the development of the standard and will be removed

More information

Red Flag Policy and Identity Theft Prevention Program

Red Flag Policy and Identity Theft Prevention Program Unified Government of Wyandotte County and Kansas City, Kansas Adopted: 5/11/2011 Red Flag Policy and Identity Theft Prevention Program Authority: The Mayor and the Board of Commissioners are responsible

More information

Standard CIP Cyber Security Critical Cyber Asset Identification

Standard CIP Cyber Security Critical Cyber Asset Identification Standard CIP 002 1 Cyber Security Critical Cyber Asset Identification Standard Development Roadmap This section is maintained by the drafting team during the development of the standard and will be removed

More information

New York Department of Financial Services Cybersecurity Regulation Compliance and Certification Deadlines

New York Department of Financial Services Cybersecurity Regulation Compliance and Certification Deadlines New York Department of Financial Services Cybersecurity Regulation Compliance and Certification Deadlines New York Department of Financial Services ( DFS ) Regulation 23 NYCRR 500 requires that entities

More information

These rules are subject to change periodically, so it s good to check back once in a while to make sure you re still compliant.

These rules are subject to change periodically, so it s good to check back once in a while to make sure you re still compliant. HIPAA Checklist There are 3 main parts to the HIPAA Security Rule. They include technical safeguards, physical safeguards, and administrative safeguards. This document strives to summarize the requirements

More information

Compliance with ISPS and The Maritime Transportation Security Act of 2002

Compliance with ISPS and The Maritime Transportation Security Act of 2002 Mr. Melchor Becena Security Administrator Port Everglades SecurePort Conference Miami, Florida 25-27 27 February, 2004 Compliance with ISPS and The Maritime Transportation Security Act of 2002 Overview

More information

The Common Controls Framework BY ADOBE

The Common Controls Framework BY ADOBE The Controls Framework BY ADOBE The following table contains the baseline security subset of control activities (derived from the Controls Framework by Adobe) that apply to Adobe s enterprise offerings.

More information

2016 SC REGIONAL HOUSING AUTHORITY NO. 3 S EIV SECURITY POLICY

2016 SC REGIONAL HOUSING AUTHORITY NO. 3 S EIV SECURITY POLICY 2016 SC REGIONAL HOUSING AUTHORITY NO. 3 S EIV SECURITY POLICY Purpose: The purpose of this policy is to provide instruction and information to staff, auditors, consultants, contractors and tenants on

More information

Annex 1 to NIST Special Publication Recommended Security Controls for Federal Information Systems

Annex 1 to NIST Special Publication Recommended Security Controls for Federal Information Systems Annex 1 to NIST Special Publication 800-53 Recommended Security Controls for Federal Information Systems Minimum Security Controls Low Baseline AC-1 ACCESS CONTROL POLICY AND PROCEDURES The organization

More information

Data Inventory and Classification, Physical Devices and Systems ID.AM-1, Software Platforms and Applications ID.AM-2 Inventory

Data Inventory and Classification, Physical Devices and Systems ID.AM-1, Software Platforms and Applications ID.AM-2 Inventory Audience: NDCBF IT Security Team Last Reviewed/Updated: March 2018 Contact: Henry Draughon hdraughon@processdeliveysystems.com Overview... 2 Sensitive Data Inventory and Classification... 3 Applicable

More information

Information Technology Security Plan Policies, Controls, and Procedures Identify Governance ID.GV

Information Technology Security Plan Policies, Controls, and Procedures Identify Governance ID.GV Information Technology Security Plan Policies, Controls, and Procedures Identify Governance ID.GV Location: https://www.pdsimplified.com/ndcbf_pdframework/nist_csf_prc/documents/identify/ndcbf _ITSecPlan_IDGV2017.pdf

More information

Red Flags Program. Purpose

Red Flags Program. Purpose Red Flags Program Purpose The purpose of this Red Flags Rules Program is to document the protocol adopted by the University of Memphis in compliance with the Red Flags Rules. Many offices at the University

More information

Donor Credit Card Security Policy

Donor Credit Card Security Policy Donor Credit Card Security Policy INTRODUCTION This document explains the Community Foundation of Northeast Alabama s credit card security requirements for donors as required by the Payment Card Industry

More information

Privacy Breach Policy

Privacy Breach Policy 1. PURPOSE 1.1 The purpose of this policy is to guide NB-IRDT employees and approved users on how to proceed in the event of a privacy breach, and to demonstrate to stakeholders that a systematic procedure

More information

TWIC or TWEAK The Transportation Worker Identification Credential:

TWIC or TWEAK The Transportation Worker Identification Credential: TWIC or TWEAK The Transportation Worker Identification Credential: Issues and Challenges for MTSA-Regulated Facility Owner/Operators THE USUAL DISCLAIMER By: Presentation at AAPA Administrative & Legal

More information

IDENTITY THEFT PREVENTION Policy Statement

IDENTITY THEFT PREVENTION Policy Statement Responsible University Officials: Vice President for Financial Operations and Treasurer Responsible Office: Office of Financial Operations Origination Date: October 13, 2009 IDENTITY THEFT PREVENTION Policy

More information

Data Backup and Contingency Planning Procedure

Data Backup and Contingency Planning Procedure HIPAA Security Procedure HIPAA made Easy Data Backup and Contingency Planning Procedure Please fill in date implemented and updates for your facility: Goal: This document will serve as our back-up storage

More information

EMERGENCY SUPPORT FUNCTION (ESF) 13 PUBLIC SAFETY AND SECURITY

EMERGENCY SUPPORT FUNCTION (ESF) 13 PUBLIC SAFETY AND SECURITY EMERGENCY SUPPORT FUNCTION (ESF) 13 PUBLIC SAFETY AND SECURITY PRIMARY AGENCY: SUPPORT AGENCIES: Savannah-Chatham Metropolitan Police Department Armstrong-Atlantic Campus Police Department Bloomingdale

More information

1. Post for 45-day comment period and pre-ballot review. 7/26/ Conduct initial ballot. 8/30/2010

1. Post for 45-day comment period and pre-ballot review. 7/26/ Conduct initial ballot. 8/30/2010 Standard CIP 011 1 Cyber Security Protection Standard Development Roadmap This section is maintained by the drafting team during the development of the standard and will be removed when the standard becomes

More information

Annex 3 to NIST Special Publication Recommended Security Controls for Federal Information Systems

Annex 3 to NIST Special Publication Recommended Security Controls for Federal Information Systems Annex 3 to NIST Special Publication 800-53 Recommended Security Controls for Federal Information Systems Minimum Security Controls High Baseline Includes updates through 04-22-2005 AC-1 ACCESS CONTROL

More information

Texas A&M University Controlled Substances Guidelines Training Module. September 2017

Texas A&M University Controlled Substances Guidelines Training Module. September 2017 Texas A&M University Controlled Substances Guidelines Training Module September 2017 Applicability Guidelines for the purchase, storage, use, and disposal of controlled substances used in research and

More information

Data Privacy Breach Policy and Procedure

Data Privacy Breach Policy and Procedure Data Privacy Breach Policy and Procedure Document Information Last revision date: April 16, 2018 Adopted date: Next review: January 1 Annually Overview A privacy breach is an action that results in an

More information

Sparta Systems TrackWise Digital Solution

Sparta Systems TrackWise Digital Solution Systems TrackWise Digital Solution 21 CFR Part 11 and Annex 11 Assessment February 2018 Systems TrackWise Digital Solution Introduction The purpose of this document is to outline the roles and responsibilities

More information

Data Centre Security. Presented by: M. Javed Wadood Managing Director (MEA)

Data Centre Security. Presented by: M. Javed Wadood Managing Director (MEA) Data Centre Security Presented by: M. Javed Wadood Managing Director (MEA) EPI history and global locations UK origin, 1987 Singapore office, 1999 9 EPI offices worldwide Global partner network spanning

More information

IT SECURITY RISK ANALYSIS FOR MEANINGFUL USE STAGE I

IT SECURITY RISK ANALYSIS FOR MEANINGFUL USE STAGE I Standards Sections Checklist Section Security Management Process 164.308(a)(1) Information Security Program Risk Analysis (R) Assigned Security Responsibility 164.308(a)(2) Information Security Program

More information

XAVIER UNIVERSITY Building Access Control Policy

XAVIER UNIVERSITY Building Access Control Policy Effective: March 25, 2019 Last Updated: March 20, 2019 XAVIER UNIVERSITY Building Access Control Policy Responsible University Office: Auxiliary Services, Physical Plant Responsible Executive: Vice President,

More information

The City of Mississauga may install Closed Circuit Television (CCTV) Traffic Monitoring System cameras within the Municipal Road Allowance.

The City of Mississauga may install Closed Circuit Television (CCTV) Traffic Monitoring System cameras within the Municipal Road Allowance. Policy Number: 10-09-02 Section: Roads and Traffic Subsection: Traffic Operations Effective Date: April 25, 2012 Last Review Date: Approved by: Council Owner Division/Contact: For information on the CCTV

More information

TECHNICAL AND ORGANIZATIONAL DATA SECURITY MEASURES

TECHNICAL AND ORGANIZATIONAL DATA SECURITY MEASURES TECHNICAL AND ORGANIZATIONAL DATA SECURITY MEASURES Contents Introduction... 3 The Technical and Organizational Data Security Measures... 3 Access Control of Processing Areas (Physical)... 3 Access Control

More information

3 rd Party Certification of Compliance with MA: 201 CMR 17.00

3 rd Party Certification of Compliance with MA: 201 CMR 17.00 3 rd Party Certification of Compliance with MA: 201 CMR 17.00 The purpose of this document is to certify the compliance of Strategic Information Resources with 201 CMR 17.00. This law protects the sensitive

More information

Standard CIP-006-1a Cyber Security Physical Security

Standard CIP-006-1a Cyber Security Physical Security A. Introduction 1. Title: Cyber Security Physical Security of Critical Cyber Assets 2. Number: CIP-006-1a 3. Purpose: Standard CIP-006 is intended to ensure the implementation of a physical security program

More information

Technology Control Plan

Technology Control Plan Technology Control Plan I. Statement of policy and assignment of responsibility The University of Illinois at Urbana-Champaign (UIUC) is committed to complying with the export laws and regulations of the

More information

Administrative Procedure

Administrative Procedure Administrative Procedure Number: 403 Effective: 9/19/05 Supercedes: 7/10/02 Page: 1 of 15 Subject: LOCK/KEY CONTROL POLICY 1.0. PURPOSE: To establish the policy and procedures for the coordination of a

More information

Pasco Police Department Policy Manual. CRIME ANALYSIS AND INTELLIGENCE Chapter No. 40. Effective Date: 04/01/2018. Reference:

Pasco Police Department Policy Manual. CRIME ANALYSIS AND INTELLIGENCE Chapter No. 40. Effective Date: 04/01/2018. Reference: CRIME ANALYSIS AND INTELLIGENCE Chapter No. 40 Effective Date: 04/01/2018 Reference: 40.1.1 Crime and Intelligence Analysis Procedures Crime and intelligence analysis is a law enforcement agency function

More information

[Utility Name] Identity Theft Prevention Program

[Utility Name] Identity Theft Prevention Program [Utility Name] Identity Theft Prevention Program Effective beginning, 2008 Minnesota Municipal Utilities Association Sample Red Flag policy I. PROGRAM ADOPTION The [Utility Name] ("Utility") developed

More information

SDBOR Technology Control Plan (TCP) Project Title:

SDBOR Technology Control Plan (TCP) Project Title: SDBOR Technology Control Plan (TCP) Project Title: Principal Investigator: Phone: Department: Email: Description of Controls (EAR/ITAR Category): Location(s) Covered by TCP: Is sponsored research involved?

More information

Best Practices for Campus Security. January 26, 2017

Best Practices for Campus Security. January 26, 2017 Best Practices for Campus Security January 26, 2017 Welcome to Safe University (Safe U ) Protecting People, Property, and Tradition: The Safe University (Safe U SM ) Program By G. Michael Verden, Owner

More information

CIP Cyber Security Configuration Change Management and Vulnerability Assessments

CIP Cyber Security Configuration Change Management and Vulnerability Assessments Standard Development Timeline This section is maintained by the drafting team during the development of the standard and will be removed when the standard becomes effective. Development Steps Completed

More information

Physical and Environmental Security Standards

Physical and Environmental Security Standards Physical and Environmental Security Standards Table of Contents 1. SECURE AREAS... 2 1.1 PHYSICAL SECURITY PERIMETER... 2 1.2 PHYSICAL ENTRY CONTROLS... 3 1.3 SECURING OFFICES, ROOMS AND FACILITIES...

More information

University of North Texas System Administration Identity Theft Prevention Program

University of North Texas System Administration Identity Theft Prevention Program University of North Texas System Administration Identity Theft Prevention Program I. Purpose of the Identity Theft Prevention Program The Federal Trade Commission ( FTC ) requires certain entities, including

More information

INFORMATION ASSURANCE DIRECTORATE

INFORMATION ASSURANCE DIRECTORATE National Security Agency/Central Security Service INFORMATION ASSURANCE DIRECTORATE CGS Physical Enterprise Physical Enterprise Monitoring is the monitoring of the physical and environmental controls that

More information

Technology / Export Control Plan (T/ECP)

Technology / Export Control Plan (T/ECP) Technology / Export Control Plan (T/ECP) Technology Control Plan Template This project/activity involves the use of Export-Controlled Information (ECI). As a result, the project/activity comes under the

More information

UTAH VALLEY UNIVERSITY Policies and Procedures

UTAH VALLEY UNIVERSITY Policies and Procedures Page 1 of 5 POLICY TITLE Section Subsection Responsible Office Private Sensitive Information Facilities, Operations, and Information Technology Information Technology Office of the Vice President of Information

More information

Trust Services Principles and Criteria

Trust Services Principles and Criteria Trust Services Principles and Criteria Security Principle and Criteria The security principle refers to the protection of the system from unauthorized access, both logical and physical. Limiting access

More information

SAND No C Sandia is a multiprogram laboratory operated by Sandia Corporation, a Lockheed Martin Company, for the United States Department

SAND No C Sandia is a multiprogram laboratory operated by Sandia Corporation, a Lockheed Martin Company, for the United States Department SAND No. 2012-1606C S 0 606C Sandia is a multiprogram laboratory operated by Sandia Corporation, a Lockheed Martin Company, for the United States Department of Energy s National Nuclear Security Administration

More information

DIRECTIVE ON INFORMATION TECHNOLOGY SECURITY FOR BANK PERSONNEL. June 14, 2018

DIRECTIVE ON INFORMATION TECHNOLOGY SECURITY FOR BANK PERSONNEL. June 14, 2018 DIRECTIVE ON INFORMATION TECHNOLOGY SECURITY FOR BANK PERSONNEL June 14, 2018 A. Overriding Objective 1.1 This Directive establishes the rules and instructions for Bank Personnel with respect to Information

More information